×

Blog

Occasionaly we write some interesting things we were working on.

Are popups bad for your business?

Matija Galina on 14 Jan 2019

A short discussion about the existence and usage of pop-ups in a modern web environment or Why are they still a thing?

Read more

Mine my opinion? Part 2. What’s so hard about sentiment analysis?

Tena Belinić on 17 Dec 2018

In our last article, we explained different types of sentiments analysis, and now, we’ll focus on problems!

Read more

Pragmatic tracing

Neven Miculinić on 21 Nov 2018

A distributed system is one in which the failure of a computer you didn't even know existed can render your own computer unusable - Leslie Lamport

Read more

Mine my opinion? Part 1. Let’s start with basics – types

Tena Belinić on 06 Nov 2018

In our series of articles, you’ll learn everything about sentiment analysis and how to use it! First, we’ll start with types.

Read more

Migrating your self-hosted Elasticsearch to AWS Elasticsearch Service - a detailed guide

Daniel Romić on 30 Oct 2018

An in-depth guide for migrating your self-hosted Elasticsearch to AWS Elasticsearch Service.

Read more

Cut bake and pack - Build machine images with Docker apps using Hashicorp Packer

Daniel Romić on 07 Oct 2018

Heard of Hashicorp's Packer? Here we take a quick dive in building an Ubuntu image with Docker apps within.

Read more

Text classification - simple way to organize your data

Tena Belinić on 17 Sep 2018

Let’s talk about text classification – one of the most important and typical tasks in data science. We’ll explain its benefits, where to use it and show how to make order and organize some articles.

Read more

Are you a truth seeker?

Daniel Romić on 13 Aug 2018

Establishing a truthful auditing is a challenge worth considering.

Read more

Summer hacking school at FOI

Jasna Benčić on 25 Jul 2018

Kraken folks have attended and participated in FSec summer hacking school at Faculty of organization and informatics...

Read more

Let me tell you a secret

Jasna Benčić on 13 Jul 2018

They always use Alice and Bob in technical examples. We’ll use Anna and George as fictional characters in our article where we put an emphasis on the secure way of sharing data between team members.

Read more
Page 1 of 3